Hi,
found a working solution w/ EAC!
Client EWC/B@AP EAC (Radius Proxy) NPS (EAP-TLS)
Here's my community contribution (based on
Volker Kull's advice):
@EWC
VNS > Global > Authentication > RFC 3580 (ACCESS-ACCEPT) Options: "Both RADIUS Filter-ID and Tunnel-Private-Group-ID attributes" VNS > WLAN Service > Auth & Acct > RADIUS TLVs > Zone Support >
RADIUS Request Called Station ID Options > Replace BSSID with Zone name AP > Edit selected AP > AP Properies > Zone:
@EAC
Access Control >
Group Editor > Location Group:
+ Add New Group (for each location):
+ Switches: "List"
+
+ Interface: "Wireless"
+ AP ID:
Access Control Profiles > Policy Mappings >
+ Add New:
+ Map to Location: Select Location
+ Policy Role: "Enterprise Access"
+ VLAN [id] Name: Add New: +
+ VLAN Egress: "Tagged"
Access Control Profile
+ Add New (for each location)
+ Accept Policy: Select Policy Mapping (step #2)
+ Replace RADIUS Attributes with Accept Policy
Access Control Configurations > Default
+ Add New Rule (for each location)
+ Authentication Rule: 802.1X (EAP-TLS)
+ Location Group: Select Location (step #1)
+ Profile: Select Access Control Profiles (step #2)
Enforce
Policy >
Roles/Services > Enterprise Access > Mappings
+ Add (Type: RFC3580) VLAN: for each location
Save Domain Enforce Domain (Ignore Errors)
Note:
Client is authenticated against NPS.
Policy (Role/VLAN mapping) is applied directly from EAC.
Role
Enterprise Access is used as an example
Cheers!